Start of first round of discussions for around 60 minutes. There will be 10 roundtables and you can attend at three different tables/topics.Roundtable 1: Laurent Jacquemin, EMEA Field CTO of Akamai Enterprise Security GroupCo-moderated by a SIGS ContributorCan Zero-Trust Principles Close the Gap Between On-Prem and Cloud Security?
Modern organizations increasingly rely on the cloud to manage their critical systems and store their most valuable data. With the growing shift of applications and workloads to the cloud, security and cloud teams are facing a growing number of challenges. One of those is extending segmentation and Zero Trust principles to applications and workloads in cloud environments.
The unique and dynamic nature of the cloud means that cloud workloads are more exposed to external threats than on-premises resources are. Organizations need to make sure they reduce the attack surface and contain attacks on applications and workloads in their public cloud environments.
Roundtable 2: Phil Jacobs, Principal Intelligence Solutions Advisor at Intel471Co-moderated by a SIGS ContributorFrom Threat Actor to Action: Operationalizing Cyber Threat Intelligence
How organizations can turn threat intelligence into actionable outcomes within workflows, playbooks, and strategic risk assessments.
Discussion Points:
• What makes threat intel truly actionable?
• Integrating CTI into pipelines and detections
• Where does AI fit? Benefits and risks
• Success stories: pre-emptive blocking, attack surface reduction, and early-warning examples
Roundtable 3: Christer Swartz, Director Industry Solutions at IllumioCo-moderated by a SIGS ContributorAI: Are we all doomed? Or can we address AI threats proactively, rather than reactively?
Along with the promises of AI, the other side of the coin is a new wave of dramatically effective cyber threats which rely on AI to slip past the most complex cyber defences.
Is the only solution to AI threats the use of AI threat-prevention, creating an endless cat-and-mouse chase? Or is there a way to address AI threats along some common dependencies which they all share, hopefully future-proofing ourselves against the expected AI apocalypse?
Roundtable 4: Jürgen Hofmann, Sales Engineer at Cato NetworksCo-moderated by a SIGS ContributorGlobal Protection, Local Performance: SASE for the Modern Enterprise
The increasing shift of applications to the cloud, hybrid work models, and the constantly growing threat landscape are presenting traditional security and network architectures with new challenges. In this roundtable, we will discuss practical ways in which Secure Access Service Edge (SASE), as a converged, cloud-native platform, can help meet these demands.
The focus will be on real-world use cases: How can consistent, globally available protection be established for mobile employees, cloud environments, and branch offices? How can remote sites in China be connected with high performance? How can Zero Trust Network Access (ZTNA) effectively replace traditional VPN structures while improving the user experience? And what opportunities does SASE offer to scale network and security functions agilely while reducing complexity?
We will also explore the typical path to implementation: from initial pilot projects and migration strategies to gradual integration into existing IT landscapes. The discussion will include how this transformation can be achieved without major changes to the existing architecture and by leveraging existing security investments.
This session is aimed at technical IT security professionals interested in an open exchange on SASE strategies, best practices, and lessons learned.
Roundtable 5: Assaf Pilo, Specialist SaaS Security, Falcon Shield at CrowdStrikeCo-moderated by a SIGS ContributorOut of the shadows: Securing SaaS Applications and Identities?
SaaS apps are powering our work like never before—but they’re also opening the door to misconfigurations, shadow identities, and blind spots we can’t afford to ignore. In “Out of the Shadows: Securing SaaS Applications and Identities,” we’ll sit down to unpack how these challenges can be tackled.
Together, we’ll explore what it takes to secure sprawling SaaS environments—including insights on identity protection, threat detection, posture management, and building toward a Zero Trust model. Whether it’s securing IdPs, managing service accounts, or surfacing misconfigurations before attackers do, this is a chance to compare lessons learned, and leave with new practical ideas.
Roundtable 6: Daniel Bachofen, Sr. Sales Engineer at SentinelOneCo-moderated by a SIGS ContributorAI to the Rescue?Join us for a deep dive into how AI is fundamentally changing the daily work of a SOC analyst. This roundtable will focus on the practical benefits of AI-enabled tools, which are moving beyond hype to become essential partners for security professionals. We'll explore how these tools streamline workflows by automating repetitive tasks, enriching alert data with crucial context, and identifying subtle threats that might otherwise be missed.
The discussion will highlight how AI empowers analysts to move past triage and focus on complex, high-impact investigations, ultimately making their work more strategic and effective.
Roundtable 7: Raul Lapaz, Lead Product SecOps and IR at RocheCo-moderated by a SIGS ContributorKubernetes Security: Are Our Clusters as Safe as We Think?
As Kubernetes becomes the de facto standard for container orchestration, it also becomes a prime target for attackers. Misconfigurations, overly permissive RBAC, exposed APIs, and insecure supply chains are just a few of the many attack surfaces that often go unnoticed until it's too late.
Are current best practices and tools enough to defend Kubernetes workloads? Or are we still playing catch-up with evolving threats?
Raul Lapaz designs and deploys secure cloud/container environments for healthcare products on AWS and also an author of "Learning Kubernetes Security" book, second edition. He'd like to discuss practical approaches to hardening clusters, detecting runtime threats, type of logs, tooling and how to build a culture of shift left together with you.
Roundtable 8: Todd James, Head of Cyber Defense Operations at SwisscomCo-moderated by a SIGS ContributorAwesome Detection, What's the Policy?
Your SOC is swimming in alerts that have nothing to do with the detection of criminal activity. With greater cloud and AI adoption these compliance alerts are only increasing while more harmful cyber risks are being shunted to the background. This is an opportunity for an open discussion as to their importance, techniques to root out false assumptions, and to have a sounding board for the community on their observations and experiences.
It's definitely not a sexy topic, but once you get these types of alerts under control your SOC analysts will thank you!
Roundtable 9: Vincenzo Di Somma, CISO at Crypto Finance GroupCo-moderated by a SIGS ContributorPhishing Simulations: Beyond the Click Rate
This panel explores how to accurately interpret phishing simulation results, moving past raw click metrics to understand user behavior, risk exposure, and effective security culture development.
Roundtable 10: Gary Adams, Sales Engineering Leader at RubrikCo-moderated by a SIGS ContributorAre you ready for Cyber Recovery? Cyber Resilience is Business Resilience!
Cyber attacks are currently the biggest business risk. Analysts assume that in 10 years, we will experience a successful ransomware attack approximately every 2 seconds. So it's not a question of whether you will be attacked, nor when, but how often.
In this round table, we will discuss why backup is not the same as cyber recovery and how metadata can be used to recognize the ‘blast radius’ of an attack and proactively reduce the attack surface in the long term in order to reduce or even completely compensate for the potential damage. Let´s discuss how you can increase cyber resilience and
- Proactively reduce the attack surface
- Determine the ‘blast radius’ of an attack
- Be able to restore the environment without reinfection
- How AI can help